Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sam

Results 426 - 450 of 1140Sort Results By: Published Date | Title | Company Name
Published By: AppDynamics     Published Date: Nov 02, 2017
Microservices are a type of software architecture where large applications are made up of small, self-contained units working together through APIs that are not dependent on a specific language. Each service has a limited scope, concentrates on a particular task and is highly independent. This setup allows IT managers and developers to build systems in a modular way. In his book, “Building Microservices,” Sam Newman said microservices are small, focused components built to do a single thing very well.
Tags : 
    
AppDynamics
Published By: SAP     Published Date: Nov 01, 2017
Dieses Webinar gibt Ihnen einen Überblick über die SAP HANA Enterprise Cloud (HEC). Wir zeigen Ihnen anhand von Beispielen die Möglichkeiten des HEC Services für Ihre SAP-Applikationen, auch im Zusammenspiel mit SAP S/4HANA. Dieses neueste ERP-Produkt der SAP eröffnet Ihnen alle Optionen einer digitalisierten Unternehmensausrichtung.
Tags : 
    
SAP
Published By: Cybric     Published Date: Oct 30, 2017
Learn how a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Development velocity is accelerating as enterprises adopt DevOps methodologies, yet security is still not integrated into the coding and deployment processes. Security teams are falling further behind as their manual processes and controls can’t scale at the same rate as development. This paper discusses: The impact the current approach to application security has on business How shifting security left in the application development process, seamlessly integrating it “early and often,” can accelerate innovation Questions the Board and C-suite are now asking about security: are you prepared? Read this paper to learn how, by shifting security left in the development process, it’s now no longer an obstacle to velocity, innovation and competitiveness. Instead, it’s an asset.
Tags : 
application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cio, ciso, appsec
    
Cybric
Published By: OneLogin     Published Date: Oct 24, 2017
We’re living through a time where people, organizations and societies not only rely but thrive upon secure, simple and fast access to information. From small businesses, startups, enterprises and global conglomerates across all verticals; to local, state and federal governments; to educational institutions and nonprofits, we are continuously investing in our employees, devices, applications, networks and infrastructure that enable us to drive our collective missions forward. Ten years ago, business and technology leaders catalyzed a cloud app revolution that has changed the way organizations manage IT. However, through this transformative shift, the core requirements of IT remain the same. Technology leaders are responsible for ensuring that 1) information assets remain confidential and protected, 2) information systems are available and operational, and 3) people are empowered and productive with the apps and information they need. IAM is a technology and security discipline that has
Tags : 
    
OneLogin
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
Midsized firms operate in the same hypercompetitive, digital environment as large enterprises—but with fewer technical and budget resources to draw from. That’s why it is essential for IT leaders to leverage best-practice processes and models that can help them support strategic business goals such as agility, innovation, speed-tomarket, and always-on business operations. A hybrid IT implementation can provide the infrastructure flexibility to support the next generation of high-performance, data-intensive applications. A hybrid foundation can also facilitate new, collaborative processes that bring together IT and business stakeholders.
Tags : 
digital environment, hyper competitive, business goals, hybrid it, technology, hpe
    
Hewlett Packard Enterprise
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Oracle     Published Date: Oct 20, 2017
For the past several years IBM has been divesting its hardware business. At the same time, Oracle has continued to invest in IT infrastructure and cloud innovation. Oracle SPARC servers offer you greater performance and efficiency compared to IBM Power systems, with additional security and lower costs, along with the flexibility to run your applications on-premises or in the Oracle Cloud. Download this whitepaper to completely understand the value of the Oracle SPARC and the 5 reasons to choose Oracle SPARC over IBM Power.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Replacing your aging infrastructure with a modern Oracle SPARC and Solaris architecture boosts the security, efficiency and performance of your data center. But, what about ongoing business growth and expansion? With the same architecture on-premises and in the Oracle Cloud, SPARC provides the easiest, most cost effective approach to modernizing your business infrastructure. Download this whitepaper to completely understand the value of the Oracle SPARC and the 5 reasons to modernize your data center with Oracle SPARC.
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 20, 2017
For the past several years IBM has been divesting its hardware business. At the same time, Oracle has continued to invest in IT infrastructure and cloud innovation. Oracle SPARC servers offer you greater performance and efficiency compared to IBM Power systems, with additional security and lower costs, along with the flexibility to run your applications on-premises or in the Oracle Cloud.
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
Replacing your aging infrastructure with a modern Oracle SPARC and Solaris architecture boosts the security, efficiency and performance of your data center. But, what about ongoing business growth and expansion? With the same architecture on-premises and in the Oracle Cloud, SPARC provides the easiest, most cost effective approach to modernizing your business infrastructure.
Tags : 
    
Oracle CX
Published By: SAS     Published Date: Oct 18, 2017
With the support of SAS, the Internet of Things Institute developed the 2017 Internet of Things ROI Research Study to gather real-world insights, lessons learned and future guidance from current users of IoT technology and advanced analytics. This selective sample of IoT users offers valuable insights to both IoT innovators and organizations still waiting to see how the technology evolves before investing. Multiple business layers and functions have input into IoT decision making. Discover which layer was most critical to success for those organizations that have achieved the highest percentage of their targeted ROI. Learn about the main drivers of success for IoT users achieving higher returns. Lastly, the results highlight six primary factors that can undermine an IoT initiative and how they can be prevented.
Tags : 
    
SAS
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Das Privileged Access Management umfasst Funktionen für Kontrolle, Monitoring und Auditing, mit denen die Risiken im Zusammenhang mit privilegierten Anwendern, Accounts und Anmeldeinformationen gemindert werden sollen. In den letzten Jahren hat sich herausgestellt, dass diese Aufgabe für Unternehmen aller Arten hohe Priorität hat. Diesem Anstieg an Interesse und Aufmerksamkeit liegen mehrere Faktoren zugrunde:
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: IBM     Published Date: Oct 17, 2017
Banks today are continuously challenged to meet rigorous regulatory requirements. They must implement strict governance programs that enable them to comply with a wide variety of regulations stemming from the financial crisis that began in 2007, including the DoddFrank Act, Basel Committee on Banking Supervision regulations, the General Data Protection Regulation (GDPR), the Revised Payment Services Directive (PSD2) and the revised Markets in Financial Instruments Directive (MiFID2). Many of these new regulations are spurring banks to rethink how data from across the enterprise flows into the aggregated risk and capital reports required by regulatory agencies. Data must be complete, correct and consistent to maintain confidence in risk reports, capital reports and analytical analyses. At the same time, banks need ways to monetize, grant access to and generate insight from data
Tags : 
    
IBM
Published By: Microsoft     Published Date: Oct 09, 2017
SaaS ist eine Chance für ISVs, ihr Geschäft grundlegend zu verändern: Sie können so zusätzlichen Mehrwert für Kunden bieten, Software an ein breiteres Spektrum von Kunden verkaufen und interne Abläufe optimieren. Der Markt für Software passt sich schnell der Nachfrage nach dieser Liefermethode an. Softwarekäufer berücksichtigen Gesamtbetriebskosten, einfache Handhabung und Flexibilität bei ihrer Kaufentscheidung. ISVs müssen sich auf diesen Wandel vorbereiten. Dieses Dokument erkläutert die Vorteile, die aus Änderungen am ISV-Business Modell (die Stellung im Wettbewerb) und am Betriebsmodell (die Ausführung auf dem Geschäftsmodell) herrühren, sowie die Vorschläge zur Vorbereitung auf eine SaaS-Umstellung. Als Grundlage dienen die Erfahrungen von 20 ISVs, die von einem traditionellen Softwarelizenzierungs- und Bereitstellungsmodell erfolgreich auf SaaS umgestellt haben.
Tags : 
betriebsmodell, geschafts-modell, preise, aufstellung, differenzierung, skalierung, struktur, prozesse, ressourcen
    
Microsoft
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
A recent Argyle survey found that nearly 60% of marketing organizations currently use some form of Account-Based Marketing (ABM), while 28% plan to use it in the near future. This shows the rising importance of ABM in the marketing mix. However, ABM does have its challenges. Almost 30% of the same respondents claimed that maintaining personalized, but consistent interactions with prospects was the most prominent challenge in ABM. For more insight on how marketing executives are optimizing ABM, download this survey.
Tags : 
    
Oracle Marketing Cloud
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
In a new study by Forbes Insights and sponsored by Oracle Marketing Cloud, 60% of brand and agency executives say their roles and responsibilities have changed significantly over the past two years. As a result, both groups are reengineering their internal organizations and forging new ways of working with their respective agency or brand counterparts. At the same time, the research found that technology is ingrained in marketing operations and, perhaps most significantly of all, agency and brand stakeholders are challenging themselves to analyze and apply consumer data in more sophisticated ways. Some are even hiring data scientists and others outside of the traditional marketing discipline to help in these efforts.
Tags : 
    
Oracle Marketing Cloud
Published By: Inspirus     Published Date: Oct 04, 2017
When we set out to conduct this study, we thought there would be quite marked differences between needs and expectations of employees from different countries and generations. In the end, we found that to be untrue." Sodexo Benefits and Rewards Services conducted a study across five countries comparing Millennials and non-Millennials in the workplace and found that the top five expectations of each group were exactly the same: Security and protection for their future, health and family Manage own time/work-life balance Monetary recognition for personal contribution Career development, regular and ongoing feedback Personal development inside as well as outside of the workplace Read the study now to learn more!
Tags : 
    
Inspirus
Published By: IBM     Published Date: Oct 03, 2017
Many new regulations are spurring banks to rethink how data from across the enterprise flows into the aggregated risk and capital reports required by regulatory agencies. Data must be complete, correct and consistent to maintain confidence in risk reports, capital reports and analytical analyses. At the same time, banks need ways to monetize, grant access to and generate insight from data. To keep pace with regulatory changes, many banks will need to reapportion their budgets to support the development of new systems and processes. Regulators continually indicate that the banks must be able to provide, secure and deliver high-quality information that is consistent and mature.
Tags : 
data aggregation, risk reporting, bank regulation, enterprise, reapportion budgets
    
IBM
Published By: SAP     Published Date: Sep 28, 2017
In today’s digital economy, consumer products (CP) companies face pressures from all sides. Consumers wield great power based on easy access to information about products, pricing, and availability. The barriers of entry for new players with the “next big product idea” are lower than ever. At the same time, channel partners, from big retailers to Amazon, are expanding their own private-label businesses. Added to all that, tremendous volatility persists in the basic costs of doing business, from raw materials, to labor, to shipping, and beyond.
Tags : 
sap, 4hana, real time supply, digitized sales, software portfolio, value proposition, customer
    
SAP
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Microsoft commissioned Forrester Consulting to conduct a Total Economic Impact™ study to examine the potential return on investment (ROI) businesses can receive through the deployment of Office 365. To better understand the benefits, costs, and risks associated with an Office 365 implementation, we interviewed four existing customers and surveyed 72 midsized organizations (with 150 to 2,000 users) about the use of Microsoft business products the SaaS platform, including Office Professional Plus, Exchange, Skype for Business (formerly Lync), SharePoint, Yammer, and OneDrive. Our research found that a sample composite organization (which switched from an on-premises 2010 version solution to Office 365) had total present value benefits of $3.4 million versus total present value costs of $1.3 million, resulting in a net present value (NPV) of $2.1 million.
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s growing businesses face a tough challenge. They need to provide the same affordable, always-on mobile services that more established businesses offer, but without the economic support enterprises can fall back on. That means IT professionals are onstantly looking for creative ways to do more with less: managing teams, stretching budgets, and making the most of infrastructure and applications. To meet the needs of their organisations within those constraints, they’re turning to the cloud.
Tags : 
    
Microsoft Office 365
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: DellEMC and Intel     Published Date: Sep 26, 2017
Beschleunigen Sie Ihre Anwendungen und Ihre IT-Planung mit der Geschwindigkeit, Effzienz und Erschwinglichkeit der All-Flash Lösungen von Dell EMC und Intel®. Im Folgenden finden Sie das vollständige Portfolio an All-Flash-Arrays und außerdem erfahren sie, wieso Dell EMC der Marktführer im Bereich All-Flash ist. Erfahren Sie mehr über Dell EMC Enterprise-Lösungen in Zusammenarbeit mit Intel®. Intel Inside®. Leistungsstark & effizient Outside.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel
Published By: DellEMC and Intel     Published Date: Sep 26, 2017
Mit der richtigen Kombination von Optionen für Performance, Preis und Dichte, bringt unser breites Portfolio Flash in die Reichweite von Unternehmen jeder Größe und macht 2016 zum Jahr der All-Flash Rechenzentren. Verringern Sie Speicherkosten und Komplexität mit zuverlässiger Performance bei geringer Latenz, entdecken Sie wie Dell EMC All-Flash Speicherlösungen mit Intel® Ihr Rechenzentrum heute modernisieren. Erfahren Sie mehr über Dell EMC Enterprise-Lösungen in Zusammenarbeit mit Intel®.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.